CVE-2019-25076

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-25076
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-25076.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-25076
Downstream
Published
2022-09-08T23:15:10.447Z
Modified
2025-11-20T11:02:25.442951Z
Severity
  • 5.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.

References

Affected packages

Git / github.com/openvswitch/ovs

Affected ranges

Type
GIT
Repo
https://github.com/openvswitch/ovs
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

v0.*

v0.90.0
v0.90.1
v0.90.2
v0.90.3
v0.90.4
v0.90.6
v0.90.7
v0.99.0
v0.99.1
v0.99.2

v1.*

v1.0.0
v1.0.1
v1.1.0pre1
v1.1.0pre2

v2.*

v2.17.0
v2.17.1
v2.17.2

v3.*

v3.0.0